Skip to content

Commit 03ab0e4

Browse files
committed
Fixes for Acrolinx and consistency
1 parent 2d32778 commit 03ab0e4

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

defender-office-365/attack-simulation-training-simulations.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -794,7 +794,7 @@ All actions on existing simulations start on the **Simulations** tab. To go ther
794794

795795
You can copy an existing simulation and modify it to suit your needs. This action saves time and effort when you create new simulations based on previous ones.
796796

797-
You can copy any simulation that's available in the **Simulations** tab, regardless of the **Status** value. When you copy the simulation, you can change the setting in the new copy of the simulation . For example, change the simulation name, description, technique, payload, and target users.
797+
You can copy any simulation that's available in the **Simulations** tab, regardless of the **Status** value. When you copy the simulation, you can change the setting in the new copy of the simulation. For example, change the simulation name, description, technique, payload, and target users.
798798

799799
- We don't recommend copying **Failed** simulations, because the reasons for failure could recur in the copied simulation.
800800
- When you copy a simulation, the most recent settings are used in the copy (for example, the payload, landing page, and end-user notifications). If any content is deleted, you're prompted to select the respective content again.
@@ -808,7 +808,7 @@ To copy a simulation, do the following steps:
808808

809809
1. On the **Simulations** tab at <https://security.microsoft.com/attacksimulator?viewid=simulations>, find and select the simulation to copy by selecting the check box next to the name.
810810
2. Select the :::image type="icon" source="media/m365-cc-sc-copy-icon.png" border="false"::: **Copy simulation** action that appears on the tab.
811-
3. The simulation wizard opens with all the settings from the original simulation. The default simulation name on the **Name simulation** page is the original name plus the the suffix **_Copy**.
811+
3. The simulation wizard opens with all the settings from the original simulation. The default simulation name on the **Name simulation** page is the original name plus the suffix **_Copy**.
812812
4. Review and modify the simulation configuration as needed. Select **Submit** to launch it or **Save and close** to review it later. If you select **Cancel**, the copied simulation isn't saved.
813813

814814
### Cancel simulations
@@ -825,7 +825,7 @@ After you cancel the simulation, the **Status** value changes to **Canceled**.
825825
- Cancelling a simulation with the **Status** value **Scheduled** results in 100% cancellation. No training assignment messages or notifications are sent, and the campaign is fully ended.
826826
- Cancelling a simulation with the **Status** value **In progress** has the following results:
827827
- Simulation delivery continues to the target users.
828-
- If you cancel the simulation after a training assignment, the training assignments are still shown as due, but subsequent training reminders are cancelled.
828+
- If you cancel the simulation after a training assignment, the training assignments are still shown as due, but subsequent training reminders are canceled.
829829
- If you cancel the simulation before a training assignment, the trainings aren't assigned and no training assignment notifications are sent.
830830
- Users who already received the simulated phishing message experience the following results:
831831
- For social engineering techniques that use phishing links (all except **Malware Attachment**), the links are deactivated. Selecting the link displays the following message:

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ For more information on what's new with other Microsoft Defender security produc
4141

4242
## August 2024
4343

44-
- (Preview) You can now run [simulations](attack-simulation-training-simulations.md) with QR code payloads in [Attack simulation training](attack-simulation-training-get-started.md). You can track user repsonses and assign training to end users.
44+
- (Preview) You can now run [simulations](attack-simulation-training-simulations.md) with QR code payloads in [Attack simulation training](attack-simulation-training-get-started.md). You can track user responses and assign training to end users.
4545

4646
- [Use the built-in Report button in Outlook](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook): The built-in **Report** button in Outlook for Microsoft 365 and Outlook 2021 now support the [user reported settings](submissions-user-reported-messages-custom-mailbox.md) experience to report messages as Phishing, Junk, and Not Junk.
4747

@@ -77,7 +77,7 @@ For more information on what's new with other Microsoft Defender security produc
7777
- Submit messages to Microsoft.
7878
- Trigger investigations.
7979
- Block entries in the Tenant Allow/Block List.
80-
- Actions are contextual based on the latest delivery location of the message, but SecOps personnel can use the **Show all response actions** toggle to allow all available actions.
80+
- Actions are contextually based on the latest delivery location of the message, but SecOps personnel can use the **Show all response actions** toggle to allow all available actions.
8181
- For 101 or more messages selected, only email purge and propose remediation options are available.
8282

8383
> [!TIP]
@@ -97,7 +97,7 @@ For more information on what's new with other Microsoft Defender security produc
9797
## January 2024
9898

9999
- **New training modules available in Attack Simulation Training**: Teach your users to recognize and protect themselves against QR code phishing attacks. For more information, see [this blog post](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/train-your-users-to-be-more-resilient-against-qr-code-phishing/ba-p/4022667).
100-
- **Providing intent while submitting is now generally available**: Admins can identify if they're submitting an item to Microsoft for a second opinion or they're submitting the message because it's malicious and was missed by Microsoft. With this change, Microsoft analysis of admin submitted messages (email and Microsoft Teams), URLs, and email attachments is further streamlined and results in a more accurate analysis. [Learn more](submissions-admin.md).
100+
- **Providing intent while submitting is now generally available**: Admins can identify if they're submitting an item to Microsoft for a second opinion or they're submitting the message because it's malicious and was missed by Microsoft. With this change, Microsoft analyses of admin submitted messages (email and Microsoft Teams), URLs, and email attachments are further streamlined and results in a more accurate analysis. [Learn more](submissions-admin.md).
101101

102102
## December 2023
103103

@@ -264,7 +264,7 @@ For more information on what's new with other Microsoft Defender security produc
264264
## August 2021
265265

266266
- [Admin review for reported messages](submissions-admin-review-user-reported-messages.md): Admins can now send templated messages back to end users after they review reported messages. The templates can be customized for your organization and based on your admin's verdict as well.
267-
- You can now add allow entries to the Tenant Allow/Block List if the blocked message was submitted as part of the admin submission process. Depending on the nature of the block, the submitted URL, file, and/or sender allow entries are added to the Tenant Allow/Block List. In most cases, the allows are added to give the system some time and allow it naturally, if warranted. In some cases, Microsoft manages the allow for you. For more information, see:
267+
- You can now add allow entries to the Tenant Allow/Block List if the blocked message was submitted as part of the admin submission process. Depending on the nature of the block, the submitted URL, file, and/or sender allow entries are added to the Tenant Allow/Block List. In most cases, the allows entries are added to give the system some time and allow it naturally, if warranted. In some cases, Microsoft manages the allow entries for you. For more information, see:
268268
- [Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft)
269269
- [Report good email attachments to Microsoft](submissions-admin.md#report-good-email-attachments-to-microsoft)
270270
- [Report good email to Microsoft](submissions-admin.md#report-good-email-to-microsoft)

0 commit comments

Comments
 (0)